Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I feel like part of the problem is that there’s a lot of difficulty in giving access to this kind of data for a specific purpose, and a specific purpose only (please correct me if I’m wrong). This is a problem that can be (and should be!) solved with time.

Advanced cryptographic techniques allow you (as the data owner) to restrict the function(s) you can compute on the data. In addition to that, they ensure that the only thing the parties on the other end would learn is the result of the function computed. But of course, we’re still a ways away from these techniques being practical, as the field of ML moves at a much higher pace.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: